Results 121 to 130 of about 72,170 (255)
CoINS‐Parking: Compressed IoT Blockchain Network Smart Parking
In this paper, CoINS‐Parking, a compressed IoT blockchain network for smart parking systems, is presented. Smart parking collects data and processes it to provide real‐time information about parking availability.
Danial Fazelpour, Athena Abdi
doaj +1 more source
Abstract Skeletal muscle is highly plastic and capable of remodeling its contractile and metabolic properties depending on physical demands. Such remodeling requires modification of chromatin structure to support transcriptional activation and repression of gene programs. Chromatin dynamics depend, in part, on the acetylation and methylation of histone
Daniel Gamu +5 more
wiley +1 more source
Secure resource metering and accounting with hash chain in cloud storage
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU +5 more
doaj
A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment
Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most ...
Seong Cheol Yoon +3 more
doaj +1 more source
Validator selection using pre-committed hash chains
Validators pre-commit hash chains of length w. When creating a block, validators commit the pre-image to the current hash in their hash chain, and combines it with the random number Selector, hash(x) ⊕ Selector. This random number selects the next validator.
openaire +1 more source
Hash chaining degrades security at Facebook
Modern web and digital application password storage relies on password hashing for storage and security. Ad-hoc upgrade of password storage to keep up with hash algorithm norms may be used to save costs but can introduce unforeseen vulnerabilities. This is the case in the password storage scheme used by Meta Platforms which services several billion ...
openaire +2 more sources
A Key Level Selection Within Hash Chains for the Efficient Energy Consumption in WSNS
Hyunwoo Lee, Su Man Nam, Tae Ho Cho
openalex +1 more source
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems [PDF]
Jongkwan Lee
openalex +1 more source
Analysis of cross-chain technology of blockchain
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO +4 more
doaj

